Answer:
Atoms in group 1:
H
Li
Na
K
Rb
Cs
Fr
Sharing contacts is different from sharing a calendar. Use the drop-down menus to explain how.
1. You can share contacts with
outside the organization without publishing online.
2. You are not able to that somebody share their contacts with you.
3. Both calendars and contacts are shared in emails. For the latter, the recipient clicks
and selects from a list.
Answer:
anyone
request
open shared contacts
Explanation:
edge 2020
Answer:
anyone
request
open shared contacts
Explanation:
How do I create a videogame
Answer:
-Learn how to code
-Make Character
-Design
-Go to classes
-Go on video game platforms and make an video game(rblx is the best in my opinion)
-Play video games and see the scripts
-Decide what type of video game your making(horror, family game, battle game, etc.)
Explanation:
Answer:
By using programming languages such as Lua And JavaScript because they are the best for programming videogames
A common error by beginning programmers is to forget that array subscripts start with ________.
a. 0
b. the number of elements in the array
c. spaces
d. 1
Answer:.
Explanation:
PLS HELP BEING TIMED!!!
Complete the following sentence.
The basics of managing money such as balancing a checkbook and making a budget are _____
skills
Answer:
Bank Rate skills
Explanation:
because it is i believe
write a program which calculates the difference between two integers which are entered by the user. The answer should be a positive integer regardless of the order in which the integers are entered.
In python 3.8:
print(abs(int(input("Enter a number: "))-int(input("Enter a number: "))))
What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network
Answer: vulnerability scanners
Explanation:
The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.
Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.
what class are you in?
can you help me in connection?
Answer:personal computer:)
Explanation:
help plz i need help ASAP
bhgydhusjbhhuidjs
Answer:
id.k
Explanation:
good luck
Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to reduce the amount of e-mail she receives?
Carefully read and complete subscription forms.
Read e-mail messages every hour.
Stop using the Internet.
Forward spam to spam at uce.gov.
Stop posting her e-mail address on newsgroups.
Answer:
I think that carefully reading and completing subscription forms is important and could possibly lower the amount of emails.
Reading them every hour will only hurt her work ethic.
Stop using the internet won't help at all.
Forwarding the spam to spam at uce.gov could work because that's what the site was made to do.
Stop posting her e-mail address on newsgroups could definitely help.
I'm stuck between the 1st, 4th, and 5th one but its one of them.
How many answer choices are you allowed?
It is steps plural.
Answer:2,3,5
Explanation:
Which sentence best describes how block-based code works?
Answer:
Block-based code is a simpler way to code.
Explanation:
Block-based coding is a form of programming language where the developer issues instructions by dragging and dropping blocks.
i need help, thank you
Answer:
uhh yes?
Explanation:
i think people can go on weeks without food, so a set of trays wit food should last them a day
What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network
Answer:
RIP
Explanation:
RIP is a routing protocol that stands for Routing Information Protocol. It is a distance-vector routing algorithm which uses a hop count for routing its metric. RIP is the most popular and frequently used on internet. RIP uses hop count, which means it goes from low hop count to high hop count.
Therefore, it is the Routing Infomation Protocol which is the most popular distance-vector routing algorithm used to determine the best routes within a network.
Which scenarios are examples of students managing their time well? Check all that apply. A student studies while watching her favorite television shows. A student sets aside time to study every afternoon at his desk. O A student writes down some goals that she hopes to achieve in school. A student drafts a study schedule that includes breaks. A student uses her desk calendar to record the due dates for her homework assignments. O A student rushes through his homework while sending text messages to friends. 3). Intro
Answer:
b,c,d, and e
Explanation:
Hope this helps
Answer:
BCDE
Explanation:
EDG 2021
state the functions of all the parts of the computer
Answer:
Parts of a computer with their functions
The computer case. This is the part that holds all of the internal components to make up the computer itself. ...
Motherboard. ...
CPU: Central Processing Unit. ...
RAM: Random Access Memory. ...
Graphics Card. ...
Sound Card. ...
Hard Drive. ...
SSD: Solid State Drive.
Explanation:
Which of the following identifies the most appropriate courses to take in high school for someone interested in becoming a mechanical engineer?
drafting- and math-related courses
math- and science-related courses
computer- and design-related courses
science- and computer-related courses
Answer: New questions in Health
Which member of the multidisciplinary team would help a patient improve his flexibility in the joints after a knee-replacement surgery? A. a physiot…
What are two advantages of a multidisciplinary team approach? better diagnosis in complex cases shared responsibility for decisions more opportunit…
MARKING PEOPLE AS BRAINLIST PLEASEEE HELP Where is the carbon dioxide picked up and the oxygen unloaded in the body? A:Arteries B:Veins C:Capillar…
Which healthcare professional would be primarily responsible for treating a patient for his anxiety disorder after a surgery? A. a nurse B. a nutr…
Do Now: What might be a situation where it might be important to identify 3 points somebody? What are different strategies that scientists could use …
Explanation:
please help, thank you
Answer:
radish spinach swiss chard
Explanation:
Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase words should take precedence over lowercase words. For example, 'Z' comes before 'a'. I am stuck on this python assignment. Don't need the answer asap, just some explaining of how to write code to do that. I know about the built in sort function
Answer:
Read the file and save it to a variable as a string, split the string variable and cast it to a set object using the set function to get the unique words in the file. Then use the max function with the key attribute to use regular expression module "re" to compare the first letter of each item to return in a list comprehension or append to a list.
Explanation:
The open function is used to import a file in python, the split string method splits the string to a list of items and the set function removes any duplicates of a word or item.
Using the for loop statement, iterate over the items and compare and return the items in alphabetical order with the 're' search method getting the item with uppercase letters with higher precedence than lowercase.
Which graph or chart shows changes in the value of data?
a
Bar graph
b
Column chart
c
Line graph
d
Pie chart
Answer:
Bar graph and Pie chart
Answer:
C And D
Explanation:
edge2020 users
plzz help me with this question.........
Write a program to input a number find the sum of digits and the number of digits. Display the output
sample input - 7359
sample digits - 24
number of digits - 4
Answer:
str = input("Enter a number: ")
sum = 0
for c in str:
sum = sum + int(c)
print("Sample input - {}".format(str))
print("Sum of digits - {}".format(sum))
print("Number of digits - {}".format(len(str)))
Explanation:
That's python. Was that what you were looking for?
import java.util.*;
public class Digit
{
public static void main(String args[ ] )
{
Scanner in=new Scanner (System.in)
System.out.print("Enter a number: ");
int n = in.nextInt();
int sum = 0, count = 0;
while (n!=0)
{
int d = n % 10;
sum + = d;
count++;
n /= 10;
}
System.out.println("Sum of digits=" +sum);
System.out.println("Number of digits=" +count);
}
}
what is multimedia computer system
A Multimedia can be defined as any application that combines text with graphics, animation, audio, video, and/or virtual reality. Multimedia systems are used for security to keep intruders out of a system and for the protection of stored documents
What are the two negative impacts of computer technology to the society?
One negative is that people are getting very impatient. This is because people are getting used to things instantly coming up onto their screens. Another negative is that people are being manipulated more easily. Nowadays anyone can be an expert if they sound smart enough. Then they can spread their lies quickly to millions of people.
choose the type of error described. can you help me bc i don’t know??
Answer:
logic error occurs when the result is wrong...
syntax error occurs when you use the wrong punctuation...
runtime error occurs when the program starts running...
Answer:
Logic error: When the computer outputs an undesirable value due to the wrong use of operations.
Syntax error: Occurs when syntax is not used correctly in code.
Zero division error: Occurs when a value is divided by zero.
Hope this helps :)
What are specific and relevant terms that will help you locate information using an internet search engine?
A: Keywords
B: Search Words
C: Smart Words
D: Unusual Words
please help me!!
Answer:
keyword
Explanation:
i got it right
what is wrong with this picture?????
“you got a tight little-“
uhm y’know everything is wrong with it terrifying really is uhm but yeah.
oh god that leg tho
Which part of project management considers if employees will work at home or in the office?
Analysis
Resources
Scope
Time
Answer:
i think its time
Explanation: you have to manage your time for the project and you wouldnt think of all the other things.
Answer: It might be resources because not everyone at home will have the same books, etc that is used in a project while making it.
Explanation:
What is the first thing animators need to determine when beginning a project?
a Editing locations
b Length of the film or project
c Setting
d Characters
Answer:c
Explanation:
Anyone know the logic notation of this following logic circuit?
Answer:
Concept: Logic Circuit
You have two variables A and B A and B go to the XOR logic command.B goes to the NOT operator Lastly the result of both XOR & NOT go to the OR operator Please rate positively and give brainlistwhich of the following types of correspondence is used to inform the reader of new information such as a policy change
Answer: Memo
Explanation: Have a good day, pls mark me brainliest <3
Define watcher block
Answer:
Happens when you are watching a series / film / drama / etc. but can not retain the attention span to watch for long periods of time. As well as the shortened viewing time, the ability to retain what has been viewed is impaired.
Explanation:
The Block Watcher puts the power of a microprocessor to work analyzing the current feed to the rails. This detector has been designed to eliminate many of the installation problems associated with the installation of signal systems. ... Then connect the detector output switch to your signal system.
I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.
My code:
b = float(input("Enter Temperature: "))
Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line
Answer:
The error is because you wrapped the input in float. First record the input and then modify it.
Explanation:
b = input("enter temp:")
b = float(b)